Amdahl Trust Center
Amdahl is in compliance with security best practices, has implemented and is monitoring comprehensive controls, and maintains policies to outline its security procedures.
Compliance
Resources
SOC 2 Type II Report
Risk and Governance Executive Committee Charter
Acceptable Use Policy
Personnel Security Policy
Board of Directors Charter
Controls
Remote access tool
ePHI policy accessibility evidence
Access restricted to modify infrastructure
Access control procedures
Access review of infrastructure
ePHI data sanitization
Encryption of data
Privacy and confidentiality governance charter
Data loss prevention tool
Database restorations
Source code tool
Business continuity and disaster recovery testing
Vulnerability scanning
Web application firewall
Sample code changes
SSL/TLS certificates for infrastructure
Intrusion detection tool
Infrastructure baseline hardening policy
Network diagram
Monitoring tool
Security incident list
Alerts and remediation
Breach notification communication
Incident response and breach notification policy
Whistleblower policy
Log management tool
ePHI risk assessment report
Vendor management program
Vendor list
Vendor onboarding
Vendor termination
Media disposal training
New employee and contractor agreements
List of newly hired employees & contractors
Employee handbook
List of active employees & contractors as on date
Asset register maintaining
Multi-availability zones
Risk and Governance Executive Committee meeting minutes
Risk management program
Information security policies and procedures
Customers list
Mobile device management tool
Patient status and admission records
Mobile device management tool configurations
Subprocessors
Big Query | Google CloudLogging & Observability